• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

449 Courses in London delivered Online

Level 2 Diploma in Cyber Security

5.0(2)

By Online Training Academy

Cyber security is of paramount importance in the digital age, serving as a vital shield against ever-evolving Cyber security threats. In the UK, its significance is underscored by a burgeoning demand fueled by a surge in Cyber security attacks and digital vulnerabilities. With a projected increase of 25% in cyber incidents annually, the need for skilled cyber security professionals is escalating rapidly. This demand translates into abundant job opportunities across various sectors, ranging from government agencies to private enterprises. Moreover, cyber security roles offer competitive salaries, with entry-level positions starting at around £30,000 per year and experienced professionals commanding salaries well over £60,000 annually. Embracing a career in cyber security not only presents a chance to contribute to safeguarding digital infrastructure but also offers the prospect of a lucrative and rewarding profession in a field that is continually expanding and evolving. Key Features This Level 2 Diploma in Cyber Security Course Includes: This Level 2 Diploma in Cyber Security Course is CPD Certified Free Certificate Level 2 Diploma Developed by Specialist Lifetime Access From our Cyber security course, you will learn about cyber security, cyber attacks types, cybercrimes overview & password management . So, stand out in the job market by completing the Cyber Security course. Get an certificate and add it to your resume to impress your employers. Course Curriculum Level 2 Diploma in Cyber Security Course: Module 01: Fundamentals of Cyber Security Module 02: Types of Cyber Attacks Module 03: Cybercrimes Overview Module 04: Cyber Security and Data Breach Incidents Module 05: Best Practices in Password Management Learning Outcomes Diploma in Cyber Security Level 2 & 3 Course : Understanding Cyber Threats: Recognize various cyber threats and their implications on Cyber security. Cybercrime Awareness: Grasp the concepts and types of cybercrimes prevalent today. Data Breach Management: Acquire skills to respond to and prevent data breaches. Effective Password Practices: Implement secure password management techniques proficiently. Safe Internet Navigation: Demonstrate safe internet browsing practices for personal and professional use. Security in Remote Work: Apply Cyber security measures for office and remote work environments effectively. Certification After completing this Diploma in Cyber Security Level 2 & 3 course, you will get a free certificate. CPD 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? Level 2 Diploma in Cyber Security Course Individuals aspiring to enter the cyber security field. Employees seeking to enhance their cyber security awareness. IT professionals aiming to specialise in cyber security. Students pursuing a career in information technology or cyber security. Anyone concerned about personal and professional cyber security. NB: This Course doesn't provide any professional qualifications. For professional qualifications, you may like to choose: Level 2 Diploma in Business Beginners in Cyber Security Level 4 Diploma in Cyber Security Level 5 Diploma in Cyber Security NCFE Level 2 Certificate in the Principles of Cyber Security Level 3 Diploma in Cyber Security Management and Operations Career path Level 2 Diploma in Cyber Security Course Cyber Security Analyst IT Security Consultant Network Security Engineer Incident Response Specialist Data Security Administrator Security Compliance Officer Certificates Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Level 2 Diploma in Cyber Security
Delivered Online On Demand1 hour 24 minutes
£12

Level 2 Diploma in Cyber Security

5.0(2)

By Online Training Academy

Cyber security is of paramount importance in the digital age, serving as a vital shield against ever-evolving Cyber security threats. In the UK, its significance is underscored by a burgeoning demand fueled by a surge in Cyber security attacks and digital vulnerabilities. With a projected increase of 25% in cyber incidents annually, the need for skilled cyber security professionals is escalating rapidly. This demand translates into abundant job opportunities across various sectors, ranging from government agencies to private enterprises. Moreover, cyber security roles offer competitive salaries, with entry-level positions starting at around £30,000 per year and experienced professionals commanding salaries well over £60,000 annually. Embracing a career in cyber security not only presents a chance to contribute to safeguarding digital infrastructure but also offers the prospect of a lucrative and rewarding profession in a field that is continually expanding and evolving. Key Features This Level 2 Diploma in Cyber Security Course Includes: This Level 2 Diploma in Cyber Security Course is CPD Certified Free Certificate Level 2 Diploma Developed by Specialist Lifetime Access From our Cyber security course, you will learn about cyber security, cyber attacks types, cybercrimes overview & password management . So, stand out in the job market by completing the Cyber Security course. Get an certificate and add it to your resume to impress your employers. Course Curriculum Level 2 Diploma in Cyber Security Course: Module 01: Fundamentals of Cyber Security Module 02: Types of Cyber Attacks Module 03: Cybercrimes Overview Module 04: Cyber Security and Data Breach Incidents Module 05: Best Practices in Password Management Learning Outcomes Diploma in Cyber Security Level 2 & 3 Course : Understanding Cyber Threats: Recognize various cyber threats and their implications on Cyber security. Cybercrime Awareness: Grasp the concepts and types of cybercrimes prevalent today. Data Breach Management: Acquire skills to respond to and prevent data breaches. Effective Password Practices: Implement secure password management techniques proficiently. Safe Internet Navigation: Demonstrate safe internet browsing practices for personal and professional use. Security in Remote Work: Apply Cyber security measures for office and remote work environments effectively. Certification After completing this Diploma in Cyber Security Level 2 & 3course, you will get a free certificate. 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? Level 2 Diploma in Cyber Security Course Individuals aspiring to enter the cyber security field. Employees seeking to enhance their cyber security awareness. IT professionals aiming to specialise in cyber security. Students pursuing a career in information technology or cyber security. Anyone concerned about personal and professional cyber security. NB: This Course doesn't provide any professional qualifications. For professional qualifications, you may like to choose: Level 2 Diploma in Business Beginners in Cyber Security Level 4 Diploma in Cyber Security Level 5 Diploma in Cyber Security NCFE Level 2 Certificate in the Principles of Cyber Security Level 3 Diploma in Cyber Security Management and Operations Career path Level 2 Diploma in Cyber Security Course Cyber Security Analyst IT Security Consultant Network Security Engineer Incident Response Specialist Data Security Administrator Security Compliance Officer Certificates Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Level 2 Diploma in Cyber Security
Delivered Online On Demand1 hour 24 minutes
£12

Python Hacking Complete Course

By Lead Academy

Quality Guarantee: Promising training excellence, satisfaction gurantee Accredited by CPD UK & Quality License Scheme Tutor Support Unlimited support via email, till you complete the course Recognised Certification: Accepted by thousands of professional bodies Start Anytime With 1 year access to the course materials Online Learning Learn from anywhere, whenever you want This Python Hacking Complete Course will help you learn about configuring IP addresses and installing Metasploitable, adding raw input to the port scanner, returning banners from the open port, finishing and testing the scanner and many more. This course at a glance Accredited by CPD UK Endorsed by Quality Licence Scheme The key elements of Python hacking. The introduction of Python and the process of installing its step-up program. What are SSH and FTP attacks and how to deal with them. How to crack the password using Python hacking What are sniffers, flooders and spoofers. What is coding DNS spoofer and learn the steps involved in the process. What is network analysis and how it is beneficial for Python hacking. Understand what is multi-functioning Reverse and gain in-depth knowledge of the same. The website penetration testing and how to use it for effective Python hacking. Why Python Hacking Complete Course right for you? This Python Hacking Complete Course is the perfect way to kickstart your career in the field of Python programming. This online course will provide you with a comprehensive understanding of the VirtualBox and Kali Linux installation. You will also get to understand the port and vulnerability scanning so as to gain proficiency in Python hacking. By the end of the course, you will have theoretical knowledge of Python hacking and understand the tools and strategies required to master hacking using Python programming. Python Hacking Complete Course Details Accredited by CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field.   The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Course Curriculum Introduction and Setup Welcome to Python for Ethical Hacking! VirtualBox installation Kali Linux Installation Adding Guest Additions Port and Vulnerability Scanning Coding a Simple Port Scanner Adding Raw_Input to Our Port Scanner Scanning the First 1,000 Ports Coding an Advanced Port Scanner Part 1 Coding an Advanced Port Scanner Part 2 Finishing and Testing our Scanner Configuring IP Address and Installing Metasploitable Returning Banner from Open Port Coding a Vulnerability Scanner Part 1 Coding a Vulnerability Scanner Part 2 SSH and FTP Attacks Automating SSH Login Part 1 Automating SSH Login Part 2 Testing Our SSH Login Program Coding a SSH Brute-Forcer Executing Commands on Target After Brute-Forcing SSH Anonymous FTP Login Attack Username & Password List Attack on FTP Password Cracking SHA256, SHA512, MD5 Cracking SHA1 Hash with Online Dictionary Getting Password from MD5 Hash Cracking crypt passwords with salt Sniffers, Flooders and Spoofers Changing MAC Address Manually Coding MAC Address Changer Theory Behind ARP Spoofing Crafting Malicious ARP Packet Coding ARP Spoofer Forwarding Packets and Restoring ARP Tables Spoofing Our IP Address and Sending Message with TCP Payload Running SynFlooder with Changed Source IP Address Getting Source and Destination MAC Address from Received Packets Sniffing FTP Username and Password Part 1 Sniffing FTP Username and Password Part 2 Getting Passwords from HTTP Websites Cloning Any Webpage Printing DNS Queries Coding DNS Spoofer Redirecting Response to Cloned Page Setting IP Table Rules and Running DNS Spoofer Network Analysis Analyzing Ethernet Header Analyzing IP Header Part 1 Analyzing IP Header Part 2 Analyzing TCP Header Multi-Functioning Reverse Theory Behind Socket Programming Wine and Pyinstaller Installation Setting Up Listener Establishing Connection Between Target and Server Implementing Send & Receive Functions Executing Commands on Target System Importing JSON Library to Parse Data Converting Python backdoor to .exe Using OS library to Change Directory Downloading & Uploading Files to Target PC Hiding our Backdoor and Creating Persistence Trying to Connect to Server Every 20 Seconds Downloading Files to Target PC Capturing Screenshot on Target PC Administrator Privilege Check Starting Other Programs with Our Shell Running Our Shell As an Image, Audio, PDF Coding a Keylogger Installing Pynput Printing Space Character Calling Timer on Our Keylogger Adding Keylogger to Our Backdoor Command and Control Center What is a Threaded Server? Accepting Connections with a Thread Managing Multiple Sessions Testing Threaded Server with Windows 10 target Fixing Q Command Coding Exit Function Attacking Multiple Targets and Gathering Botnet Website Penetration Testing Stealing Saved Wireless Passwords Saving Passwords to a File Bruteforcing Gmail Bruteforcing Any Login Page Part 1 Bruteforcing Any Login Page Part 2 Finding Hidden Directories Part 1 Finding Hidden Directories Part 2 Discovering Subdomains Changing HTTP Headers Starting Basic and Digest Authentication Bruteforcer Controlling Threads Coding Run Function Printing Usage and Testing Our Program Taking a Look at Ransomware Who should take this course? This comprehensive Python Hacking Complete Course is specially designed for Python developers interested in network security and ethical hacking. Those aspiring to accelerate their career in Python programming or want to improve their job prospects can also take this career-advancement Python hacking course. Entry Requirements There are no academic entry requirements for this Python Hacking Complete course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Python Hacking Complete Course assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner can grasp from each section. In the assessment pass mark is 60%. Certification Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35. FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Python Hacking Complete Course
Delivered Online On Demand
£25

Microsoft Outlook Course Online

By Lead Academy

This course will help you unlock the full potential of Microsoft Outlook. From beginners to experienced users, this course covers everything you need to know to efficiently manage emails, appointments, tasks and more. This Course At A Glance Accredited by CPD UK Endorsed by Quality Licence Scheme Understand Outlook interface options Learn how to send and receive an email in Outlook Get acquainted with account settings in Outlook Know the rules and alerts settings Learn how to export and import rules and alerts in Outlook Know opening options in File Outlook Learn how to create a folder in Outlook Know how to change Outlook-style Understand how to use the quick-access toolbar Learn how to fix a new appointment in Outlook Know how to respond to an email in Outlook Understand the complete guide of send and receive Microsoft Outlook Course Overview This interactive course will give you a brief overview of the outlook environment, steps to open the outlook, interface options, and the process to send and receive an email in Outlook. You will learn how to send and receive email in Outlook with attachments. This Microsoft outlook course will acquaint you with account settings, automatic replies, mailbox settings, rules and alert settings. You will learn how to export and import rules and alerts in Outlook and open options in File Outlook. By the end of the course, you will have a solid understanding of getting started with Outlook, the File menu, how to send a new email in outlook and much more. Who should take this course? This Microsoft outlook course course is perfect for those who want to thoroughly understand the File menu, write new emails in Outlook, fix a new appointment, or schedule a new meeting. Entry Requirements There are no academic entry requirements for this Microsoft outlook course, and it is open to students of all academic backgrounds. However, you are required to have a laptop/desktop/tablet or smartphone and a good internet connection. Assessment Method This Microsoft outlook course for diet assesses learners through multiple-choice questions (MCQs). Upon successful completion of the modules, learners must answer MCQs to complete the assessment procedure. Through the MCQs, it is measured how much a learner could grasp from each section. In the assessment pass mark is 60%. Course Curriculum You Can Master Microsoft Outlook You Can Master Microsoft Outlook Promo You Can Ask Me Anytime Your Facebook Support Group Quick Win - How to Send an Email in Outlook Quick Win - How to Print an Email in Outlook Another Quick Win - You Can Work Offline With Outlook Getting Started With Outlook Outlook Environment Outlook Opening Outlook Interface Options Sending and Receiving Email in Outlook Sending and Receiving Email in Outlook With Attachments File Menu Account Settings in Outlook Automatic Replies in Outlook Mail Box Settings in Outlook Rules and Alerts Settings in Outlook Exporting and Importing Rules and Alerts in Outlook Opening Options in File Outlook Home - New Email in Outlook Quick Win - How to Create Folder in Outlook Quick Win - How to Change Outlook Style Quick Win - How to Use Quick Access Toolbar New Email Options in Outlook Clipboard in New Email Basic Text in New Email Name, Include and Tags in New Email Inserting Table Into New Email Inserting Images Into New Email Inserting Shapes Into New Email Inserting Smartart Into New Email Inserting New Chart Into New Email Taking Screenshot Into New Email Links, Text and Symbol Themes, Show Fields, Encrypt, Tracking and More Options in New Email Formatting Text in New Emails Text Style in New Email Reviewing Menu in New Email Home - New Appointment New Appointment At Home Menu Home - New Meeting New Meeting at Home Menu Home - New Contact New Contact in Home Menu Home - New Task Create New Task Other New Item in Home Other New Item in Home Email Deletion in Outlook Responding to a Email in Outlook Quick Steps, Tag and Other Functions Send and Receive Complete Guide of Send and Receive Home - Folder Complete Folder Guide Review and Outlook View and Help in Outlook Options Options Intro General Options in Outlook Mail Options in Outlook Calendar Options in Outlook Contact Options in Outlook Task Options in Outlook Search Options in Outlook Language Options in Outlook Ease of Access Options in Outlook Advanced Option in Outlook Ribbon and Quick Access Toolbar Customization Security Is Everything Quick Win - Create Unknown Password Security Is Everthing Quick Win - Insecurity Is Coming From You and Others Understand Security Type or Category Have Proper Password - Start Securing You Now Don't Use the Same Password Anymore Should You Use Longer Password or Complicated Last-Pass & Authy Mobile App The Best and Only Solution to Make and Keep Password Un-Crack-Able Lastpass Setup and Configure Last-Pass Options Part 1 Last-Pass Options Part 2 Last-Pass Option Part 3 2FA Makes You Even Stronger in Password Security Is Everything, Keep Secured Your Devices Security on Your Data and Privacy Conclusion Congratulations Assessment Assessment - Microsoft Outlook Course Online Recognised Accreditation CPD Certification Service This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Many organisations look for employees with CPD requirements, which means, that by doing this course, you would be a potential candidate in your respective field. Quality Licence Scheme Endorsed The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees.     Certificate of Achievement Endorsed Certificate from Quality Licence Scheme After successfully passing the MCQ exam you will be eligible to order the Endorsed Certificate by Quality Licence Scheme. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. It will give you a competitive advantage in your career, making you stand out from all other applicants and employees. There is a Quality Licence Scheme endorsement fee to obtain an endorsed certificate which is £65. Certificate of Achievement from Lead Academy After successfully passing the MCQ exam you will be eligible to order your certificate of achievement as proof of your new skill. The certificate of achievement is an official credential that confirms that you successfully finished a course with Lead Academy. Certificate can be obtained in PDF version at a cost of £12, and there is an additional fee to obtain a printed copy certificate which is £35.   FAQs Is CPD a recognised qualification in the UK? CPD is globally recognised by employers, professional organisations and academic intuitions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. CPD-certified certificates are accepted by thousands of professional bodies and government regulators here in the UK and around the world. Are QLS courses recognised? Although QLS courses are not subject to Ofqual regulation, they must adhere to an extremely high level that is set and regulated independently across the globe. A course that has been approved by the Quality Licence Scheme simply indicates that it has been examined and evaluated in terms of quality and fulfils the predetermined quality standards. When will I receive my certificate? For CPD accredited PDF certificate it will take 24 hours, however for the hardcopy CPD certificate takes 5-7 business days and for the Quality License Scheme certificate it will take 7-9 business days. Can I pay by invoice? Yes, you can pay via Invoice or Purchase Order, please contact us at info@lead-academy.org for invoice payment. Can I pay via instalment? Yes, you can pay via instalments at checkout. How to take online classes from home? Our platform provides easy and comfortable access for all learners; all you need is a stable internet connection and a device such as a laptop, desktop PC, tablet, or mobile phone. The learning site is accessible 24/7, allowing you to take the course at your own pace while relaxing in the privacy of your home or workplace. Does age matter in online learning? No, there is no age limit for online learning. Online learning is accessible to people of all ages and requires no age-specific criteria to pursue a course of interest. As opposed to degrees pursued at university, online courses are designed to break the barriers of age limitation that aim to limit the learner's ability to learn new things, diversify their skills, and expand their horizons. When I will get the login details for my course? After successfully purchasing the course, you will receive an email within 24 hours with the login details of your course. Kindly check your inbox, junk or spam folder, or you can contact our client success team via info@lead-academy.org

Microsoft Outlook Course Online
Delivered Online On Demand
£25

NEBOSH IIRSM Certificate in Managing Risk ~ Via eLearning

5.0(18)

By Woodward Safety Health And Environment Ltd

This qualification provides a comprehensive overview of risk and risk management. It is a great way for health and safety professionals to expand their knowledge of risk beyond health and safety.

NEBOSH IIRSM Certificate in Managing Risk ~ Via eLearning
Delivered Online On Demand
£510

Cyber Security Awareness Training for Employees

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Course Overview Course Overview 00:04:00 Why Should You Care About Cybersecurity? Why Should You Care About CyberSecurity 00:03:00 Social Engineering What is Phishing and How Does it Work 00:08:00 What is Spear Phishing 00:03:00 What is Vishing and How Does it Work 00:04:00 Malware Malware - What is It and What Can it Do 00:02:00 How Can You Get Infected 00:02:00 How to Protect Against Malware 00:03:00 How Can You Tell if Your PC Infected 00:04:00 First Steps if You Realize You Have been Infected 00:01:00 How to Remove Malware from Your PC 00:02:00 Password Management What is Wrong with Your P@ssw0rd 00:05:00 Password Management Tools 00:04:00 Two-Factor Authentication 00:05:00 Use the Internet Securely Use Wireless Devices securely 00:04:00 Browse the Internet Securely 00:05:00 Maintain Physical Security Maintain Physical Security 00:03:00 Moving Forward Review and Suggestions to Stay Cyber Save 00:02:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Cyber Security Awareness Training for Employees
Delivered Online On Demand
£19

Diploma in Cyber Security

4.3(43)

By John Academy

[vc_row][vc_column][vc_column_text] Description: Want to avoid falling victim to security glitches that may compromise you or your colleagues', clients', family's and business's security? Protect your sensitive online information from cyber threats with this risk management course. This Diploma in Cyber Security Course is the ultimate guide to internet security, designed to help you safeguard your computer's system from malware, viruses, hackers and identity thieves. With the rapid growth of internet and information technology, the risks that come with storing sensitive data online is also increasing. Understanding how cybersecurity works is the first step to protecting yourself against cybercriminals. Learn how to safeguard your data, personal information and financial credentials from high-profile cyber attacks. Discover how to prevent hackers from stealing your information, money and identity that could damage your reputation and cause your financial status to be at risk. You will also familiarise with common scams and how to spot them. Key topics explored include online banking, child safety, virus and password protection. Who is the course for? Professionals who are using the internet in their daily life especially for their professions. Everyone who wants to protect themselves from harm the internet might cause it. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email.   Career Path: The Diploma in Internet Security Management will be very beneficial and helpful, especially to: Businessmen Parents Professionals Students And Everyone who Uses Internet and Computers! [/vc_column_text][/vc_column][/vc_row] Introduction Introduction 00:30:00 Child Safety Online Child Safety Online 01:00:00 Secure Payment Sites Secure Payment Sites 01:00:00 Online Banking Online Banking 00:30:00 How To Keep Your Password Safe How To Keep Your Password Safe 00:30:00 Common Scams Common Scams 01:00:00 How I Got Pharmed How I Got Pharmed 01:00:00 Virus Protection Virus Protection 01:00:00 Self Maintenance Self Maintenance 00:30:00 Personal Information Online Personal Information Online 01:00:00 Is The Internet Safe? Is The Internet Safe? 00:30:00 Recommended Reading Recommended Reading: Diploma in Cyber Security 00:00:00 Refer A Friend Refer A Friend 00:00:00 Mock Exam Mock Exam- Diploma in Cyber Security 00:20:00 Final Exam Final Exam- Diploma in Cyber Security 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Diploma in Cyber Security
Delivered Online On Demand9 hours 10 minutes
£25

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Certified Professional Ethical Hacker (CPEH) - Complete Video Training

4.3(43)

By John Academy

Description: This Certified Professional Ethical Hacker (CPEH) - Complete Video Training covers everything you need to know about becoming a certified professional ethical hacker. In this course you will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. This course is designed to introduce you to up-to-date penetrating testing, plus certification. This course will enable you to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, you will be able to understand how malware and destructive viruses function. In addition, the CPEH course helps you to learn how to implement counter response and preventative measures when it comes to a network hack. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Professional Ethical Hacker (CPEH) - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Professional Ethical Hacker (CPEH) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Professional Ethical Hacker (CPEH) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Professional Ethical Hacker (CPEH) - Complete Video Training
Delivered Online On Demand7 hours 51 minutes
£11.99

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697
1...34567...45